<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(rapid7.com) Critical Authentication Bypass Vulnerability in cPanel &amp;amp; WHM and WP Squared (CVE-2026-41940): Exploitation and Mitigation]]></title><description><![CDATA[<p>(rapid7.com) Critical Authentication Bypass Vulnerability in cPanel &amp; WHM and WP Squared (CVE-2026-41940): Exploitation and Mitigation</p><p>Critical zero-day authentication bypass (CVE-2026-41940, CVSS 9.8) in cPanel &amp; WHM and WP Squared is actively exploited in the wild. Attackers gain admin access via CRLF injection in session handling. Patch immediately—1.5M instances exposed.</p><p>In brief - A severe authentication bypass flaw in cPanel &amp; WHM/WP Squared (CVE-2026-41940) allows unauthenticated remote attackers to gain admin access. Exploitation is confirmed, with 1.5M systems at risk. Patching is urgent.</p><p>Technically - CVE-2026-41940 stems from a CRLF injection in the `cpsrvd` daemon’s session file handling. Attackers manipulate the `whostmgrsession` cookie via crafted basic auth headers to inject `user=root` into session files, bypassing authentication. Affects cPanel &amp; WHM 11.110.0–11.136.0 and WP Squared 11.136.1. PoC exploit published; no effective workarounds.</p><p>Source: <a href="https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass" rel="nofollow noopener"><span>https://www.</span><span>rapid7.com/blog/post/etr-cve-2</span><span>026-41940-cpanel-whm-authentication-bypass</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/358e621b-6660-4c4c-a066-a284356edae6/rapid7.com-critical-authentication-bypass-vulnerability-in-cpanel-amp-whm-and-wp-squared-cve-2026-41940-exploitation-and-mitigation</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:34:38 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/358e621b-6660-4c4c-a066-a284356edae6.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 20:56:13 GMT</pubDate><ttl>60</ttl></channel></rss>